SlideShare una empresa de Scribd logo
1 de 139
Descargar para leer sin conexión
Countering Insider Threat
Attacks
Centre for Defence Enterprise (CDE)
Rapid technological change
© Crown Copyright MOD 2011
The aim of CDE
© Crown Copyright MOD 2011
Prove the value of novel, high-risk,
high-potential-benefit research
© Crown Copyright MOD 2011
To enable development of cost-
effective military capability advantage
13 May 2013
Five key operating principles
underpin the CDE model
Engaging innovators
13 May 2013
Accessible opportunity
Sustaining incentives
Minimising participation costs
Compliance
Intellectual property
Two routes to funding
Online bid submission
Themed calls
CDE themed call programme
Precision timing Call closes 6 Jun 2013
(at 1700 hrs)
Countering insider threat attacks Call closes 27 Jun 2013
(at 1700 hrs)
Secure communications Call launch 18 Jun 2013
Innovation in drug development
processes
Call launch 25 Jun 2013
Enhancing military medical training
and support for the medic
Call launch 16 Jul 2013
UK Biological Engagement
Programme
Call launch 17 Sept 2013
Register and further details at www.science.mod.uk under ‘Events and Calls’
Defence Open Call
Seeking the exceptional
Challenging conventions
4355
proposals received
17%
proposals funded
£39M
contracts awarded
Making an impact
Exemplar project
Fuel efficiency
‘Micro generators’
© Crown Copyright MOD 2011
Effective proposals
Challenge, pace & exploitation
The future of CDE
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Context of today’s call
Network and question
Centre for Defence Enterprise
01235 438445
cde@dstl.gov.uk
www.science.mod.uk/enterprise
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Countering the Insider Threat -
CDE Themed Call
Dstl Support to Operations Overview
DSTL/PUB72551
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
© Crown Copyright 2013 Dstl
13 May 2013
Dstl Support to Ops
• Dstl
– Science and Technology (S&T) agency of
Ministry of Defence (MOD)
– Maximise impact of S&T on UK defence
and security
• Support to Operations (S2O)
– MOD main effort
– Provision of appropriate deployed S&T
support
– Oversight of cross-domain S2O research
– Responsive approach to short-term
priorities
• Insider Threat
UNCLASSIFIED
Insider Threat
• The Insider Threat is a real threat for UK Forces operating in
Afghanistan
• The term ‘Insider Attack’ is used when a member of the Afghan
National Security Forces (ANSF) attacks members of the
International Security and Assistance Force (ISAF), of which the UK
is a part
• The name of these incidents recognises that ANSF as well as ISAF
are targets of these attacks
• The subset terms “Green on Blue”, “Green on Green” and “Green
on Brown (contractors)” are still used to distinguish between the
intended targets of attacks
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
S&T response to Insider Threat
• Increasing numbers of incidents through 2012
• Dstl Insider Threat ‘Challenge’ Autumn12
– What more can S&T do?
• Dstl Support to Ops:
– Took forward proposals from the challenge
– Created Project MORPHEUS
– Pull together S&T in this area
• Coordinated with wider MOD effort
– Direction from MOD customers
– Permanent Joint Headquarters (PJHQ) and Ops Directorate (Afghanistan)
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Project MORPHEUS
• Portfolio of work items
– Delivery by early 2014, largely soft science
– Causes, capability gaps
– Exploitable solutions
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What do we want from you?
• Research proposals to help counter the Insider Threat
• Rapidly exploitable solutions
– Main focus is current operations
– Exploitation by January 2014
– Some interest in longer term
• Ensure no stone is left unturned
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What will you hear today?
• Operational context
• Current research
• Areas of interest
• Assumptions and constraints
• How to get involved
• Answers to your questions
– Surgery sessions this afternoon
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Joint Warfare Directorate
Countering Insider Threat
Attacks: Military Context
A View from Joint Warfare
Joint Warfare Directorate
Current situation
 Not classified until 2008?
 Peak in 2012 for UK?
 It is an issue for Coalition and Afghan National Security Forces
 Others are also examining this in detail
Joint Warfare Directorate
What has the military done?
 Training
 Equipment
 Personnel
 Information
 Doctrine
 Infrastructure
Joint Warfare Directorate
Where should the military look
next?
 Afghanistan
 Increase awareness of other cultures/religions?
 Sharing intelligence with host nation & allies?
 Ensure that the military reads and understands
doctrine/history?
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Project MORPHEUS
Countering the Insider Threat
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
DSTL/PUB72551
Overview of Current Work
UNCLASSIFIED
• The Insider Attacks are likely to be underpinned by a number of
different factors
• This is reflected by the multifaceted programme
• A number of work strands have been undertaken over the last 6
months:
– Operational Analysis
– Selection of Mentors
– Cultural Training
– Training Review
– Information Dissemination Review
– Intent Detection System Evaluation
– Protected Living Spaces
© Crown copyright 2013 Dstl
13 May 2013
Operational Analysis
• Objectives:
– To collate all available data into a classified database and conduct analysis
on Insider Threat attacks to identify any common factors and trends over
time
• Previous operations
• Analogous attacks
– To conduct interviews with members of the Afghan National Security Forces
to better understand their concerns / motivations / drivers
• Benefits:
– A greater understanding of the threat will mean that appropriate mitigation
measures can be implemented
– Work strands within the programme are evidence based
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Selection of Mentors
• Objectives:
– To provide guidance on the knowledge, skills and experience required in
order to operate successfully in the mentor role. Mentors and mentoring
teams are there to provide training and support to both develop knowledge
and improve the skills required to enhance their performance during military
and policing operations
• Benefits:
– Ensure that the most appropriate individuals deploy
in the mentor role
• Eg Those who can build productive relationships and
be culturally sensitive
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Cultural Training
• Objectives:
– To provide guidance on how to improve the pre-deployment cultural training
received by all troops
• To improve the methods of delivery
• To ensure that the ‘so what’ is included
• Benefits:
– Ensure that troops are culturally sensitive and will not cause offence
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Training Review
• Objectives:
– To identify and review current training cross government that will be relevant
for dealing with the Insider Threat on current and future operations
• Behavioural analysis/ anomaly detection
• De-escalation training
• Cultural training
• Benefits:
– Identify relevant training material and methods which could be incorporated
into a specific Insider Threat training course if required
– Provide recommendations for how ‘soft skills’ training could be incorporated
into basic training
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Information Dissemination
• Objectives:
– To review existing Insider Threat newsletters/ doctrine notes
• To propose revised content
• To provide options for effective future communication of latest Insider Threat
findings
• Benefits:
– Improved dissemination of information to target audience
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Intent Detection Systems
• Objectives:
– To consider whether Intent Detection Systems could have utility for the
Insider Threat
• Assess whether systems could detect the intent to commit an insider attack
• Evaluate the practicalities of using Intent Detection Systems on current operations
• Benefits:
– A better understanding of the capability
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Protected Living Spaces
• Objectives:
– To provide advice on materials/technologies that are available to protect
living accommodation in Afghanistan
• Benefits:
– Improved understanding of the options available to mitigate against the
vulnerabilities within living accommodation
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Summary
• These work strands give a flavour of the types of activities currently
being undertaken in this area
• Programme already established and benefits are being realised
• What else could you do?
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Countering Insider
Threat Attacks:
CDE Themed Call
Overview
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Scope
• Open to new approaches and solutions
• Current and possible future operations
• Not limited to current situation and assumptions
• Push boundaries, however unusual or radical
• Thinking differently
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Scope
• Continue partnering with host nation’s forces and
population
• Human dimension:
– Insider Threat: Underlying causes? Influence over others? Opportunity?
Ability? Timing? Location? Outcome?
– UK forces: Awareness? Response? Training? Influence?
• Technology:
– Detect intent? Share situational awareness? Building layout to minimise
effects? Weapon suppressors?
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What’s required
• Research proposals for new solutions and technology to help mitigate
the Insider Threat
• New ways of countering attacks
• Re-use old ideas from a related world
• Social and behavioural sciences
– Training, tools, planning aids
• Proof-of-concept technology
• ‘Doing things differently’
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What’s not required
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
• Long-term social and behavioural science studies
• Incremental improvements
• Ideas with no realistic probability of exploitation
Call challenges
• Call divided into four challenges:
1. Dissuade Improving the effects of influence
2. Detect Improving the identification of intent
3. Prepare Improving the effectiveness of training
4. Protect Improving Force Protection
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Call challenges
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect Understand
human behaviour
Training
Force Protection/
equipment
Next steps
• Proposals are sought to address one or more of these
challenges
• Current and possible future operations
• Short-term studies for delivery by end January 2014
• Proposals involving human participants will require MOD ethics
approval
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Exploitation
• Current work often exploited rapidly through changes to pre-
deployment training
• Technical Partner will be assigned to each successful proposal
– Provide interface with MOD
– Assist with exploitation
• Stakeholder Day will be held on completion of all successful
proposals
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Timescales, funding
• 21 May 2013 Webcast published
• 27 June 2013 Call closes 1700 hrs
• £400k available for this CDE themed call
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Background information
• Proposed work must be unclassified
• Data sources
– Open sources
– BBC3 Our War
– Online
– Analogous communities
– MOD website
• Operations & Deployments
• Thinking differently…
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Challenge 1
Dissuade –
Improving the effects of Influence
DSTL/PUB72551
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Improving the effects of Influence
‘How can people be dissuaded from undertaking
insider attacks, both before and during an
incident?’
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Improving the effects of Influence
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect Understand
Human behaviour
Training
Force Protection/
equipment
Background
• Identify underlying causes of Insider Attacks
– Understand Afghan National Security Forces troops
– Understand the Afghan people
– Wider applicability to other crises
• Social sciences disciplines
– Anthropology, Psychology, Law History,
International Relations, Economics, Theology
• Output
– Operations: eg Cultural Specialists, Human Terrain Teams
– Education: HQ, unit and individual training
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
De-escalation
• De-escalation (Dissuasion)
– Reduce underlying grievances
– Broader, longer-term, higher-level issues
• De-escalation (Detection, Prevention, Protection)
– Defuse confrontation
– Local, immediate, tactical-level issues
– Often language constrained
• Social science can inform both categories
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Potential avenues of research
• Novel ways to understand Afghan culture
• Novel tools to help understand what might influence someone
• Novel methods to understand someone’s level of discontent
• Novel methods to disseminate information to Afghans
particularly if they can’t read
• Afghan cultural awareness of ISAF
• Afghan personnel selection
• Afghan sentiment
• Building rapport
• Afghan media
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Challenge 2
Detecting Deception
Specifically the deception associated with an insider attack
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Detecting deception
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect
Training
Force Protection/
equipment
Understand human
behaviour
Detecting deception
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect
Training
Force Protection/
equipment
Understand human
behaviours
Behavioural detection
• Person or vehicle-borne IEDs or intention of firing into a crowd
– No reliable generic indicators for suspicious intent
– Post hoc analysis is potentially problematic
– Different motivations manifest in different indicators
– Suicide bombers psychologically different to criminals
– No evidence that guilt or stress are reliable indicators of suspicious
intent
– Cultural differences
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What affects behavioural cues?
• Variety of motivations
– Personal grievance
– Planned insurgent activities
– Medical issues
– Instant emotional reaction to a particular event
• Variety of emotional states
– Calm
– Angry
– Fearful
– Elated
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Pattern of life recognition
• Expectancy Violations Theory
– Establish baseline behaviour for context
– Identify behaviour that deviates from this baseline within this context
• Skills required
– Perception
– Question
– Act
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Feedback from the front line
• BBC3 Our War
– This was deemed to be very useful prior to deployment because it
provided head cam footage of real life in theatre
• Development of:
– Empirically underpinned synthetic environments?
– Empirically underpinned interactive skills training?
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
How you can help
• Tools or techniques to enhance awareness of behaviour that
violates the relevant pattern of life
• These must be:
– Validated
– Mobile
– Easy to use
– Based on current scientific evidence
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Challenge 3
Prepare –
Training solutions
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Prepare – Training solutions
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect Understand human
behaviour
Training
Force Protection/
equipment
The problem
• We do not know why insider
attacks occur
– Infiltration by the enemy
– Poor relations
– Attackers feel insulted
– Revenge
– Stress
• Hence, providing a training solution will be difficult and
challenging
UNCLASSIFIED
© Crown copyright 2013 Dstl
13 May 2013
Insider Threat training
• Currently
– All personnel receive initial Insider Threat awareness training
– Specialist training to select high-risk groups
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Insider Threat training
• Can training
– Improve relationships?
– Enhance the ability of a person to perceive the Insider Threat?
– Improve the “course of action” decision?
– Optimise that course of action?
UNCLASSIFIED
© Crown copyright 2013 Dstl
13 May 2013
Improve relationships
• Enhance cultural understanding
– How is your wife?
– Passing in front of you when praying
• Active listening skills
• Enhancing empathy
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Enhance ability to perceive Insider
Threat
• Can you perceive insider attack behavioural cues
– Months before
– Days before
– Imminently
• What are the cues? Do they exist?
• Behavioural science
• Cultural understanding
• Observation skills
UNCLASSIFIED
© Crown copyright 2013 Dstl
13 May 2013
Improve decisions about Insider
Threat
• Decision making under pressure
• High-risk decision making
• Enable or enhance heuristics
– Mental short cuts to aid decision making
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Optimise response
• De-escalation (physical/verbal)
• Tactical communication skills
• Physical unarmed combat skills
• Close quarter armed combat skills
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Possible avenues
• Training Needs Analysis for specific and generalist roles
• Observation skills training
• Sound decision making
• De-escalate (tactical verbal communication/physical
intervention)
• Close quarter combat with firearms
• Provision of realistic training scenarios (tabletop/role play)
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Challenge 4
Protect -
Force Protection
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Force Protection
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Increase
understanding
Identify the
underlying
causes
Reduce probability
of situation
escalating
Influence
Dissuade
Protect
Prepare
Detect Understand human
behaviour
Training
Force Protection/
equipment
Introduction
• What is Force Protection?
• Outline of threat
• Prevention
• Options
• Considerations
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
What is Force Protection?
• "It is easier and more effective to destroy the enemy's aerial
power by destroying his nests and eggs on the ground than to
hunt his flying birds in the air." - General Giulio Douhet (1869-
1930) Italian army air officer known as the father of strategic air
power.
• In simple terms, Force Protection is preventive measures taken
to mitigate hostile actions in specific areas or against a specific
population
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Outline of threat
• Good range of Force Protection at ground level
– Barriers
– Partitions
– Manned/Gated entrances
• Elevated positions pose more of a threat
– Building roofs
– Sangars/Watchtowers
• However solutions enhancing
ground protection should not
be discounted
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Prevention
• Defeat of the Insider Threat could be achieved through
addressing three separate topics
– Countering the initial Insider Threat
– Prevent the Insider Threat from locating or engaging targets
– Prevent injury to Insider Threat targets
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Option 1 – Countering the initial
Insider Threat
• Ensure day to day activities are not denied
– 360 degree coverage on sentry duty within Sangar
– Normal activities at checkpoints
• Could also include early detection of a possible event
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Option 2 – Prevent the Insider Threat
from locating or engaging targets
• Masking the locations of individuals
– Screened areas
• Hanging screens
• Walls
• Prevention of munitions reaching the target
– Barriers
– Concrete walls
– Detonation screens
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Option 2 – Continued
• Need to be considerate of potential threat directions
– Where is the Insider Threat likely to come from?
– Can whatever measures be orientated to the likely threat
direction?
– Multiple directions eg Sangars in camps
– Specific directions eg Checkpoints
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Option 3 – Prevent injury to Insider
Threat targets
• Elimination or reduction of injury causing threat from
– Small arms fire
– Rocket-propelled grenades
– Other fragmenting devices
• Increased personal or area protection
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Considerations
• Need to avoid any potential of alienation
• May help to harbour any perceived culture clash
• Solutions should make the maximum use of
materials that are readily available to forces on
operations
UNCLASSIFIED© Crown copyright 2013 Dstl
13 May 2013
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Ethics approval
• Some of the proposals may require ethics approval
– Any research involving human participants in MOD research, both clinical
and non-clinical requires ethics committee approval
13 May 2013
© Crown copyright 2013 Dstl
UNCLASSIFIED
• Conduct research upon the human participant, including (but not limited to)
administering substances, taking blood or urine samples, removing biological
tissue, radiological investigations, or obtaining responses to an imposed stress or
experimental situation
Clinical
• Conduct research to collect data on an identifiable individual’s behaviour,
either directly or indirectly (such as by questionnaire or observation)
Non-Clinical
Ethics approval
• All proposals should declare if there are potential ethical hurdles to
address
• A proposal must, in the first instance, be scientifically robust in order for
it to be, prima facie, ethical
• If the proposal may require ethics approval, please make a three-part
proposal
– Milestone 1: Produce research protocols
– Milestone 2: Obtaining ethics approval for the project
– Milestone 3: Proposed research (subject to ethics approval)
• More information
– http://www.science.mod.uk/engagement/modrec/modrec.aspx
13 May 2013
© Crown copyright 2013 Dstl
UNCLASSIFIED
Introduction to CDE 1030
Programme overview 1050
Military context 1100
Current research 1120
Technical challenges 1140
Ethics 1230
Submitting a CDE proposal 1240
Q&A 1250
Networking lunch (book
surgery appointments)
1300
Surgery sessions 1400
Event close 1600
Agenda
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Centre for Defence Enterprise
Submitting a Successful Proposal
Centre for Defence Enterprise (CDE)
Maximising your chances
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Read available
information
Start with –
Quick Start Guide
plus other CDE manuals –
Account Manual, User
Manual, Technology
Application Manual
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Know what is available
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Developing a CDE proposal
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
Proposal health check
Claim of future benefit
Contribution to future benefit
Logical programme of work
Generation of evidence
Demonstration of progress
The essentials
Description
mins
Assessment
Not an exam
MOD Performance Assessment Framework
Five criteria:
Operational relevance
Likelihood of exploitation
Builds critical S&T capability to meet UK
needs
Scientific quality/innovation
Science, innovation and technology risk
Commercial tab
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
Government-furnished X
Health and safety
Ethics
Unclassified
Early birds
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
This call closes:
17:00 hrs on
Thursday 27 June 2013
Deadline
Crown Copyright (c) 2012
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
UNCLASSIFIED / FOR PUBLIC RELEASE
cde@dstl.gov.uk
Call process queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
support-to-ops-CDE@dstl.gov.uk
Call technical queries
Dstl is part of the
Ministry of Defence
UNCLASSIFIED / For Public Release
Centre for Defence Enterprise
www.science.mod.uk/enterprise cde@dstl.gov.uk
Crown Copyright Dstl 2012
www.science.mod.uk
Events and Calls > Current calls
for proposals > Countering Insider
Threat Attacks
Further information
Countering insider threat attacks - CDE themed call launch 14 May 2013

Más contenido relacionado

Destacado

Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaInsider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaRaffael Marty
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatImperva
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Ht seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHt seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHaris Tahir
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...ObserveIT
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessEric Schiowitz
 
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Phil Legg
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
NIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapNIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapWAJAHAT IQBAL
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 

Destacado (19)

Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - SevillaInsider Threat – The Visual Conviction - FIRST 2007 - Sevilla
Insider Threat – The Visual Conviction - FIRST 2007 - Sevilla
 
The Insider's Guide to the Insider Threat
The Insider's Guide to the Insider ThreatThe Insider's Guide to the Insider Threat
The Insider's Guide to the Insider Threat
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Ht seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHt seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscape
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
Visualizing the Insider Threat: Challenges and tools for identifying maliciou...
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
NIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapNIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmap
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseInsider Threat Kill Chain: Detecting Human Indicators of Compromise
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 

Similar a Countering insider threat attacks - CDE themed call launch 14 May 2013

UK Biological Engagement Programme - CDE themed competition launch
UK Biological Engagement Programme - CDE themed competition launchUK Biological Engagement Programme - CDE themed competition launch
UK Biological Engagement Programme - CDE themed competition launchDefence and Security Accelerator
 
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Defence and Security Accelerator
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competitionDefence and Security Accelerator
 
22 May 2014 :CDE Enduring challenge competition presentations
22 May 2014 :CDE Enduring challenge competition presentations22 May 2014 :CDE Enduring challenge competition presentations
22 May 2014 :CDE Enduring challenge competition presentationsDefence and Security Accelerator
 
vision-mission-objectives2012.ppt
vision-mission-objectives2012.pptvision-mission-objectives2012.ppt
vision-mission-objectives2012.pptpramod jali
 
Guidance for enhancing security posture #counter #terrorism
Guidance for enhancing security posture #counter #terrorismGuidance for enhancing security posture #counter #terrorism
Guidance for enhancing security posture #counter #terrorismEddie Hirst MSc MSyl
 
Briefing to Afghan MoD for AMNC
Briefing to Afghan MoD for AMNCBriefing to Afghan MoD for AMNC
Briefing to Afghan MoD for AMNCGreg Pepus
 
8 July 2015: Agile, immersive mission training themed competition
8 July 2015: Agile, immersive mission training themed competition8 July 2015: Agile, immersive mission training themed competition
8 July 2015: Agile, immersive mission training themed competitionDefence and Security Accelerator
 
3 Dec 2013 Integrated computational materials CDE themed competition presenta...
3 Dec 2013 Integrated computational materials CDE themed competition presenta...3 Dec 2013 Integrated computational materials CDE themed competition presenta...
3 Dec 2013 Integrated computational materials CDE themed competition presenta...Defence and Security Accelerator
 
BIFM North Key Learning Event - BAE Systems
BIFM North Key Learning Event - BAE SystemsBIFM North Key Learning Event - BAE Systems
BIFM North Key Learning Event - BAE SystemsWhitbags
 
Accelerator Enduring Challenge briefing: Cambridge Enterprise
Accelerator Enduring Challenge briefing: Cambridge Enterprise Accelerator Enduring Challenge briefing: Cambridge Enterprise
Accelerator Enduring Challenge briefing: Cambridge Enterprise Heather-Fiona Egan
 
Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Daniel McGarvey
 

Similar a Countering insider threat attacks - CDE themed call launch 14 May 2013 (20)

UK Biological Engagement Programme - CDE themed competition launch
UK Biological Engagement Programme - CDE themed competition launchUK Biological Engagement Programme - CDE themed competition launch
UK Biological Engagement Programme - CDE themed competition launch
 
Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.Secure communications - CDE themed call launch 18 June 2013.
Secure communications - CDE themed call launch 18 June 2013.
 
9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition9 September 2014: automating cyber defence responses CDE themed competition
9 September 2014: automating cyber defence responses CDE themed competition
 
22 May 2014 :CDE Enduring challenge competition presentations
22 May 2014 :CDE Enduring challenge competition presentations22 May 2014 :CDE Enduring challenge competition presentations
22 May 2014 :CDE Enduring challenge competition presentations
 
vision-mission-objectives2012.ppt
vision-mission-objectives2012.pptvision-mission-objectives2012.ppt
vision-mission-objectives2012.ppt
 
9 July 2015: CDE enduring challenge competition
9 July 2015: CDE enduring challenge competition9 July 2015: CDE enduring challenge competition
9 July 2015: CDE enduring challenge competition
 
CDE Enduring challenge competition briefing
CDE Enduring challenge competition briefing CDE Enduring challenge competition briefing
CDE Enduring challenge competition briefing
 
Guidance for enhancing security posture #counter #terrorism
Guidance for enhancing security posture #counter #terrorismGuidance for enhancing security posture #counter #terrorism
Guidance for enhancing security posture #counter #terrorism
 
Briefing to Afghan MoD for AMNC
Briefing to Afghan MoD for AMNCBriefing to Afghan MoD for AMNC
Briefing to Afghan MoD for AMNC
 
13 January 2015: Enduring challenge briefings
13 January 2015: Enduring challenge briefings 13 January 2015: Enduring challenge briefings
13 January 2015: Enduring challenge briefings
 
LECTURE BROCHURE
LECTURE BROCHURELECTURE BROCHURE
LECTURE BROCHURE
 
8 July 2015: Agile, immersive mission training themed competition
8 July 2015: Agile, immersive mission training themed competition8 July 2015: Agile, immersive mission training themed competition
8 July 2015: Agile, immersive mission training themed competition
 
IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]IntegratedAirMissileDefense18[593665]
IntegratedAirMissileDefense18[593665]
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
3 Dec 2013 Integrated computational materials CDE themed competition presenta...
3 Dec 2013 Integrated computational materials CDE themed competition presenta...3 Dec 2013 Integrated computational materials CDE themed competition presenta...
3 Dec 2013 Integrated computational materials CDE themed competition presenta...
 
BIFM North Key Learning Event - BAE Systems
BIFM North Key Learning Event - BAE SystemsBIFM North Key Learning Event - BAE Systems
BIFM North Key Learning Event - BAE Systems
 
CDE future sonar webinar
CDE future sonar webinar CDE future sonar webinar
CDE future sonar webinar
 
22 July 2014: CDE enduring challenge briefings
22 July 2014: CDE enduring challenge briefings22 July 2014: CDE enduring challenge briefings
22 July 2014: CDE enduring challenge briefings
 
Accelerator Enduring Challenge briefing: Cambridge Enterprise
Accelerator Enduring Challenge briefing: Cambridge Enterprise Accelerator Enduring Challenge briefing: Cambridge Enterprise
Accelerator Enduring Challenge briefing: Cambridge Enterprise
 
Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014Defense and Intelligence Council Newsletter-December 2014
Defense and Intelligence Council Newsletter-December 2014
 

Más de Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

Más de Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 
CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2CDE competition briefing - FASS technology challenge 2
CDE competition briefing - FASS technology challenge 2
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Countering insider threat attacks - CDE themed call launch 14 May 2013

  • 1. Countering Insider Threat Attacks Centre for Defence Enterprise (CDE)
  • 3. © Crown Copyright MOD 2011 The aim of CDE
  • 4. © Crown Copyright MOD 2011 Prove the value of novel, high-risk, high-potential-benefit research
  • 5. © Crown Copyright MOD 2011 To enable development of cost- effective military capability advantage
  • 6. 13 May 2013 Five key operating principles underpin the CDE model
  • 13. Two routes to funding
  • 16. CDE themed call programme Precision timing Call closes 6 Jun 2013 (at 1700 hrs) Countering insider threat attacks Call closes 27 Jun 2013 (at 1700 hrs) Secure communications Call launch 18 Jun 2013 Innovation in drug development processes Call launch 25 Jun 2013 Enhancing military medical training and support for the medic Call launch 16 Jul 2013 UK Biological Engagement Programme Call launch 17 Sept 2013 Register and further details at www.science.mod.uk under ‘Events and Calls’
  • 27. © Crown Copyright MOD 2011 Effective proposals
  • 28. Challenge, pace & exploitation
  • 30. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 33. Centre for Defence Enterprise 01235 438445 cde@dstl.gov.uk www.science.mod.uk/enterprise
  • 34. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 35. Countering the Insider Threat - CDE Themed Call Dstl Support to Operations Overview DSTL/PUB72551 UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 36. © Crown Copyright 2013 Dstl 13 May 2013 Dstl Support to Ops • Dstl – Science and Technology (S&T) agency of Ministry of Defence (MOD) – Maximise impact of S&T on UK defence and security • Support to Operations (S2O) – MOD main effort – Provision of appropriate deployed S&T support – Oversight of cross-domain S2O research – Responsive approach to short-term priorities • Insider Threat UNCLASSIFIED
  • 37. Insider Threat • The Insider Threat is a real threat for UK Forces operating in Afghanistan • The term ‘Insider Attack’ is used when a member of the Afghan National Security Forces (ANSF) attacks members of the International Security and Assistance Force (ISAF), of which the UK is a part • The name of these incidents recognises that ANSF as well as ISAF are targets of these attacks • The subset terms “Green on Blue”, “Green on Green” and “Green on Brown (contractors)” are still used to distinguish between the intended targets of attacks UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 38. S&T response to Insider Threat • Increasing numbers of incidents through 2012 • Dstl Insider Threat ‘Challenge’ Autumn12 – What more can S&T do? • Dstl Support to Ops: – Took forward proposals from the challenge – Created Project MORPHEUS – Pull together S&T in this area • Coordinated with wider MOD effort – Direction from MOD customers – Permanent Joint Headquarters (PJHQ) and Ops Directorate (Afghanistan) UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 39. Project MORPHEUS • Portfolio of work items – Delivery by early 2014, largely soft science – Causes, capability gaps – Exploitable solutions UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 40. What do we want from you? • Research proposals to help counter the Insider Threat • Rapidly exploitable solutions – Main focus is current operations – Exploitation by January 2014 – Some interest in longer term • Ensure no stone is left unturned UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 41. What will you hear today? • Operational context • Current research • Areas of interest • Assumptions and constraints • How to get involved • Answers to your questions – Surgery sessions this afternoon UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 42. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 43. Joint Warfare Directorate Countering Insider Threat Attacks: Military Context A View from Joint Warfare
  • 44. Joint Warfare Directorate Current situation  Not classified until 2008?  Peak in 2012 for UK?  It is an issue for Coalition and Afghan National Security Forces  Others are also examining this in detail
  • 45. Joint Warfare Directorate What has the military done?  Training  Equipment  Personnel  Information  Doctrine  Infrastructure
  • 46. Joint Warfare Directorate Where should the military look next?  Afghanistan  Increase awareness of other cultures/religions?  Sharing intelligence with host nation & allies?  Ensure that the military reads and understands doctrine/history?
  • 47. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 48. Project MORPHEUS Countering the Insider Threat UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 DSTL/PUB72551
  • 49. Overview of Current Work UNCLASSIFIED • The Insider Attacks are likely to be underpinned by a number of different factors • This is reflected by the multifaceted programme • A number of work strands have been undertaken over the last 6 months: – Operational Analysis – Selection of Mentors – Cultural Training – Training Review – Information Dissemination Review – Intent Detection System Evaluation – Protected Living Spaces © Crown copyright 2013 Dstl 13 May 2013
  • 50. Operational Analysis • Objectives: – To collate all available data into a classified database and conduct analysis on Insider Threat attacks to identify any common factors and trends over time • Previous operations • Analogous attacks – To conduct interviews with members of the Afghan National Security Forces to better understand their concerns / motivations / drivers • Benefits: – A greater understanding of the threat will mean that appropriate mitigation measures can be implemented – Work strands within the programme are evidence based UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 51. Selection of Mentors • Objectives: – To provide guidance on the knowledge, skills and experience required in order to operate successfully in the mentor role. Mentors and mentoring teams are there to provide training and support to both develop knowledge and improve the skills required to enhance their performance during military and policing operations • Benefits: – Ensure that the most appropriate individuals deploy in the mentor role • Eg Those who can build productive relationships and be culturally sensitive UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 52. Cultural Training • Objectives: – To provide guidance on how to improve the pre-deployment cultural training received by all troops • To improve the methods of delivery • To ensure that the ‘so what’ is included • Benefits: – Ensure that troops are culturally sensitive and will not cause offence UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 53. Training Review • Objectives: – To identify and review current training cross government that will be relevant for dealing with the Insider Threat on current and future operations • Behavioural analysis/ anomaly detection • De-escalation training • Cultural training • Benefits: – Identify relevant training material and methods which could be incorporated into a specific Insider Threat training course if required – Provide recommendations for how ‘soft skills’ training could be incorporated into basic training UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 54. Information Dissemination • Objectives: – To review existing Insider Threat newsletters/ doctrine notes • To propose revised content • To provide options for effective future communication of latest Insider Threat findings • Benefits: – Improved dissemination of information to target audience UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 55. Intent Detection Systems • Objectives: – To consider whether Intent Detection Systems could have utility for the Insider Threat • Assess whether systems could detect the intent to commit an insider attack • Evaluate the practicalities of using Intent Detection Systems on current operations • Benefits: – A better understanding of the capability UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 56. Protected Living Spaces • Objectives: – To provide advice on materials/technologies that are available to protect living accommodation in Afghanistan • Benefits: – Improved understanding of the options available to mitigate against the vulnerabilities within living accommodation UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 57. Summary • These work strands give a flavour of the types of activities currently being undertaken in this area • Programme already established and benefits are being realised • What else could you do? UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 58. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 59. Countering Insider Threat Attacks: CDE Themed Call Overview UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 60. Scope • Open to new approaches and solutions • Current and possible future operations • Not limited to current situation and assumptions • Push boundaries, however unusual or radical • Thinking differently UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 61. Scope • Continue partnering with host nation’s forces and population • Human dimension: – Insider Threat: Underlying causes? Influence over others? Opportunity? Ability? Timing? Location? Outcome? – UK forces: Awareness? Response? Training? Influence? • Technology: – Detect intent? Share situational awareness? Building layout to minimise effects? Weapon suppressors? UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 62. What’s required • Research proposals for new solutions and technology to help mitigate the Insider Threat • New ways of countering attacks • Re-use old ideas from a related world • Social and behavioural sciences – Training, tools, planning aids • Proof-of-concept technology • ‘Doing things differently’ UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 63. What’s not required UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 • Long-term social and behavioural science studies • Incremental improvements • Ideas with no realistic probability of exploitation
  • 64. Call challenges • Call divided into four challenges: 1. Dissuade Improving the effects of influence 2. Detect Improving the identification of intent 3. Prepare Improving the effectiveness of training 4. Protect Improving Force Protection UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 65. Call challenges UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Understand human behaviour Training Force Protection/ equipment
  • 66. Next steps • Proposals are sought to address one or more of these challenges • Current and possible future operations • Short-term studies for delivery by end January 2014 • Proposals involving human participants will require MOD ethics approval UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 67. Exploitation • Current work often exploited rapidly through changes to pre- deployment training • Technical Partner will be assigned to each successful proposal – Provide interface with MOD – Assist with exploitation • Stakeholder Day will be held on completion of all successful proposals UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 68. Timescales, funding • 21 May 2013 Webcast published • 27 June 2013 Call closes 1700 hrs • £400k available for this CDE themed call UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 69. Background information • Proposed work must be unclassified • Data sources – Open sources – BBC3 Our War – Online – Analogous communities – MOD website • Operations & Deployments • Thinking differently… UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 70. Challenge 1 Dissuade – Improving the effects of Influence DSTL/PUB72551 UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 71. Improving the effects of Influence ‘How can people be dissuaded from undertaking insider attacks, both before and during an incident?’ UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 72. Improving the effects of Influence UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Understand Human behaviour Training Force Protection/ equipment
  • 73. Background • Identify underlying causes of Insider Attacks – Understand Afghan National Security Forces troops – Understand the Afghan people – Wider applicability to other crises • Social sciences disciplines – Anthropology, Psychology, Law History, International Relations, Economics, Theology • Output – Operations: eg Cultural Specialists, Human Terrain Teams – Education: HQ, unit and individual training UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 74. De-escalation • De-escalation (Dissuasion) – Reduce underlying grievances – Broader, longer-term, higher-level issues • De-escalation (Detection, Prevention, Protection) – Defuse confrontation – Local, immediate, tactical-level issues – Often language constrained • Social science can inform both categories UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 75. Potential avenues of research • Novel ways to understand Afghan culture • Novel tools to help understand what might influence someone • Novel methods to understand someone’s level of discontent • Novel methods to disseminate information to Afghans particularly if they can’t read • Afghan cultural awareness of ISAF • Afghan personnel selection • Afghan sentiment • Building rapport • Afghan media UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 76. Challenge 2 Detecting Deception Specifically the deception associated with an insider attack UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 77. Detecting deception UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Training Force Protection/ equipment Understand human behaviour
  • 78. Detecting deception UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Training Force Protection/ equipment Understand human behaviours
  • 79. Behavioural detection • Person or vehicle-borne IEDs or intention of firing into a crowd – No reliable generic indicators for suspicious intent – Post hoc analysis is potentially problematic – Different motivations manifest in different indicators – Suicide bombers psychologically different to criminals – No evidence that guilt or stress are reliable indicators of suspicious intent – Cultural differences UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 80. What affects behavioural cues? • Variety of motivations – Personal grievance – Planned insurgent activities – Medical issues – Instant emotional reaction to a particular event • Variety of emotional states – Calm – Angry – Fearful – Elated UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 81. Pattern of life recognition • Expectancy Violations Theory – Establish baseline behaviour for context – Identify behaviour that deviates from this baseline within this context • Skills required – Perception – Question – Act UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 82. Feedback from the front line • BBC3 Our War – This was deemed to be very useful prior to deployment because it provided head cam footage of real life in theatre • Development of: – Empirically underpinned synthetic environments? – Empirically underpinned interactive skills training? UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 83. How you can help • Tools or techniques to enhance awareness of behaviour that violates the relevant pattern of life • These must be: – Validated – Mobile – Easy to use – Based on current scientific evidence UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 84. Challenge 3 Prepare – Training solutions UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 85. Prepare – Training solutions UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Understand human behaviour Training Force Protection/ equipment
  • 86. The problem • We do not know why insider attacks occur – Infiltration by the enemy – Poor relations – Attackers feel insulted – Revenge – Stress • Hence, providing a training solution will be difficult and challenging UNCLASSIFIED © Crown copyright 2013 Dstl 13 May 2013
  • 87. Insider Threat training • Currently – All personnel receive initial Insider Threat awareness training – Specialist training to select high-risk groups UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 88. Insider Threat training • Can training – Improve relationships? – Enhance the ability of a person to perceive the Insider Threat? – Improve the “course of action” decision? – Optimise that course of action? UNCLASSIFIED © Crown copyright 2013 Dstl 13 May 2013
  • 89. Improve relationships • Enhance cultural understanding – How is your wife? – Passing in front of you when praying • Active listening skills • Enhancing empathy UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 90. Enhance ability to perceive Insider Threat • Can you perceive insider attack behavioural cues – Months before – Days before – Imminently • What are the cues? Do they exist? • Behavioural science • Cultural understanding • Observation skills UNCLASSIFIED © Crown copyright 2013 Dstl 13 May 2013
  • 91. Improve decisions about Insider Threat • Decision making under pressure • High-risk decision making • Enable or enhance heuristics – Mental short cuts to aid decision making UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 92. Optimise response • De-escalation (physical/verbal) • Tactical communication skills • Physical unarmed combat skills • Close quarter armed combat skills UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 93. Possible avenues • Training Needs Analysis for specific and generalist roles • Observation skills training • Sound decision making • De-escalate (tactical verbal communication/physical intervention) • Close quarter combat with firearms • Provision of realistic training scenarios (tabletop/role play) UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 94. Challenge 4 Protect - Force Protection UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 95. Force Protection UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013 Increase understanding Identify the underlying causes Reduce probability of situation escalating Influence Dissuade Protect Prepare Detect Understand human behaviour Training Force Protection/ equipment
  • 96. Introduction • What is Force Protection? • Outline of threat • Prevention • Options • Considerations UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 97. What is Force Protection? • "It is easier and more effective to destroy the enemy's aerial power by destroying his nests and eggs on the ground than to hunt his flying birds in the air." - General Giulio Douhet (1869- 1930) Italian army air officer known as the father of strategic air power. • In simple terms, Force Protection is preventive measures taken to mitigate hostile actions in specific areas or against a specific population UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 98. Outline of threat • Good range of Force Protection at ground level – Barriers – Partitions – Manned/Gated entrances • Elevated positions pose more of a threat – Building roofs – Sangars/Watchtowers • However solutions enhancing ground protection should not be discounted UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 99. Prevention • Defeat of the Insider Threat could be achieved through addressing three separate topics – Countering the initial Insider Threat – Prevent the Insider Threat from locating or engaging targets – Prevent injury to Insider Threat targets UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 100. Option 1 – Countering the initial Insider Threat • Ensure day to day activities are not denied – 360 degree coverage on sentry duty within Sangar – Normal activities at checkpoints • Could also include early detection of a possible event UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 101. Option 2 – Prevent the Insider Threat from locating or engaging targets • Masking the locations of individuals – Screened areas • Hanging screens • Walls • Prevention of munitions reaching the target – Barriers – Concrete walls – Detonation screens UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 102. Option 2 – Continued • Need to be considerate of potential threat directions – Where is the Insider Threat likely to come from? – Can whatever measures be orientated to the likely threat direction? – Multiple directions eg Sangars in camps – Specific directions eg Checkpoints UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 103. Option 3 – Prevent injury to Insider Threat targets • Elimination or reduction of injury causing threat from – Small arms fire – Rocket-propelled grenades – Other fragmenting devices • Increased personal or area protection UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 104. Considerations • Need to avoid any potential of alienation • May help to harbour any perceived culture clash • Solutions should make the maximum use of materials that are readily available to forces on operations UNCLASSIFIED© Crown copyright 2013 Dstl 13 May 2013
  • 105. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 106. Ethics approval • Some of the proposals may require ethics approval – Any research involving human participants in MOD research, both clinical and non-clinical requires ethics committee approval 13 May 2013 © Crown copyright 2013 Dstl UNCLASSIFIED • Conduct research upon the human participant, including (but not limited to) administering substances, taking blood or urine samples, removing biological tissue, radiological investigations, or obtaining responses to an imposed stress or experimental situation Clinical • Conduct research to collect data on an identifiable individual’s behaviour, either directly or indirectly (such as by questionnaire or observation) Non-Clinical
  • 107. Ethics approval • All proposals should declare if there are potential ethical hurdles to address • A proposal must, in the first instance, be scientifically robust in order for it to be, prima facie, ethical • If the proposal may require ethics approval, please make a three-part proposal – Milestone 1: Produce research protocols – Milestone 2: Obtaining ethics approval for the project – Milestone 3: Proposed research (subject to ethics approval) • More information – http://www.science.mod.uk/engagement/modrec/modrec.aspx 13 May 2013 © Crown copyright 2013 Dstl UNCLASSIFIED
  • 108. Introduction to CDE 1030 Programme overview 1050 Military context 1100 Current research 1120 Technical challenges 1140 Ethics 1230 Submitting a CDE proposal 1240 Q&A 1250 Networking lunch (book surgery appointments) 1300 Surgery sessions 1400 Event close 1600 Agenda
  • 109. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Centre for Defence Enterprise Submitting a Successful Proposal Centre for Defence Enterprise (CDE)
  • 111. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 112.
  • 113. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 114. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 115. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Read available information Start with – Quick Start Guide plus other CDE manuals – Account Manual, User Manual, Technology Application Manual Know what is available
  • 116. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Know what is available
  • 117. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Developing a CDE proposal
  • 118. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE Proposal health check
  • 119. Claim of future benefit
  • 128. MOD Performance Assessment Framework Five criteria: Operational relevance Likelihood of exploitation Builds critical S&T capability to meet UK needs Scientific quality/innovation Science, innovation and technology risk
  • 130. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 Government-furnished X
  • 132. Ethics
  • 135. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 This call closes: 17:00 hrs on Thursday 27 June 2013 Deadline
  • 136. Crown Copyright (c) 2012 Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk UNCLASSIFIED / FOR PUBLIC RELEASE cde@dstl.gov.uk Call process queries
  • 137. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 support-to-ops-CDE@dstl.gov.uk Call technical queries
  • 138. Dstl is part of the Ministry of Defence UNCLASSIFIED / For Public Release Centre for Defence Enterprise www.science.mod.uk/enterprise cde@dstl.gov.uk Crown Copyright Dstl 2012 www.science.mod.uk Events and Calls > Current calls for proposals > Countering Insider Threat Attacks Further information